19a4c6d0dd
This patch introduces two new qvm-services: - disable-default-route - disable-dns-server Both disabled by default. You can enable any of them to not set default route and/or DNS servers in the VM. Those settings have no effect on NetVM, where such settings are controlled by NetworkManager. This is based on patch sent by Joonas Lehtonen <joonas.lehtonen@openmailbox.org> https://groups.google.com/d/msgid/qubes-devel/54C7FB59.2020603%40openmailbox.org Conflicts: network/setup-ip vm-init.d/qubes-core vm-systemd/qubes-sysinit.sh
114 lines
3.1 KiB
Bash
Executable File
114 lines
3.1 KiB
Bash
Executable File
#!/bin/sh
|
|
#
|
|
# chkconfig: 345 90 90
|
|
# description: Executes Qubes core scripts at VM boot
|
|
#
|
|
# Source function library.
|
|
. /etc/rc.d/init.d/functions
|
|
|
|
start()
|
|
{
|
|
echo -n $"Executing Qubes Core scripts:"
|
|
|
|
# Set permissions to /proc/xen/xenbus, so normal user can use qubesdb-read
|
|
chmod 666 /proc/xen/xenbus
|
|
# Set permissions to files needed to listen at vchan
|
|
chmod 666 /proc/u2mfn
|
|
|
|
mkdir -p /var/run/xen-hotplug
|
|
|
|
name=$(/usr/bin/qubesdb-read /name)
|
|
if ! [ -f /etc/this-is-dvm ] ; then
|
|
# we don't want to set hostname for DispVM
|
|
# because it makes some of the pre-created dotfiles invalid (e.g. .kde/cache-<hostname>)
|
|
# (let's be frank: nobody's gonna use xterm on DispVM)
|
|
hostname $name
|
|
sed -i "s/^\(127\.0\.0\.1[\t ].*\) \($name \)\?\(.*\)/\1\2 $name/" /etc/hosts
|
|
fi
|
|
|
|
timezone=`/usr/bin/qubesdb-read /qubes-timezone 2> /dev/null`
|
|
if [ -n "$timezone" ]; then
|
|
ln -f /usr/share/zoneinfo/$timezone /etc/localtime
|
|
echo "# Clock configuration autogenerated based on Qubes dom0 settings" > /etc/sysconfig/clock
|
|
echo "ZONE=\"$timezone\"" >> /etc/sysconfig/clock
|
|
fi
|
|
|
|
yum_proxy_setup=$(/usr/bin/qubesdb-read /qubes-service/yum-proxy-setup 2> /dev/null || /usr/bin/qubesdb-read /qubes-service/updates-proxy-setup 2> /dev/null)
|
|
type=$(/usr/bin/qubesdb-read /qubes-vm-type)
|
|
if [ "$yum_proxy_setup" != "0" ] || [ -z "$yum_proxy_setup" -a "$type" == "TemplateVM" ]; then
|
|
echo proxy=http://10.137.255.254:8082/ > /etc/yum.conf.d/qubes-proxy.conf
|
|
else
|
|
echo > /etc/yum.conf.d/qubes-proxy.conf
|
|
fi
|
|
|
|
# Set IP address again (besides action in udev rules); this is needed by
|
|
# DispVM (to override DispVM-template IP) and in case when qubes-ip was
|
|
# called by udev before loading evtchn kernel module - in which case
|
|
# qubesdb-read fails
|
|
INTERFACE=eth0 /usr/lib/qubes/setup-ip
|
|
|
|
mkdir -p /var/run/qubes
|
|
|
|
if [ -e /dev/xvdb ] ; then
|
|
resize2fs /dev/xvdb 2> /dev/null || echo "'resize2fs /dev/xvdb' failed"
|
|
mount /rw
|
|
|
|
if ! [ -d /rw/home ] ; then
|
|
echo
|
|
echo "--> Virgin boot of the VM: Linking /home to /rw/home"
|
|
|
|
mkdir -p /rw/config
|
|
touch /rw/config/rc.local
|
|
|
|
mkdir -p /rw/home
|
|
cp -a /home.orig/user /rw/home
|
|
|
|
mkdir -p /rw/usrlocal
|
|
cp -a /usr/local.orig/* /rw/usrlocal
|
|
|
|
touch /var/lib/qubes/first-boot-completed
|
|
fi
|
|
fi
|
|
if [ -L /home ]; then
|
|
rm /home
|
|
mkdir /home
|
|
fi
|
|
mount /home
|
|
|
|
[ -x /rw/config/rc.local ] && /rw/config/rc.local
|
|
|
|
success
|
|
echo ""
|
|
|
|
start_ntpd=$(/usr/bin/qubesdb-read /qubes-service/ntpd 2> /dev/null)
|
|
if [ "$start_ntpd" == "1" ]; then
|
|
/sbin/service ntpd start
|
|
fi
|
|
return 0
|
|
}
|
|
|
|
stop()
|
|
{
|
|
su -c 'mkdir -p /home_volatile/user/.local/share/applications' user
|
|
su -c 'cp -a /usr/share/applications/defaults.list /home_volatile/user/.local/share/applications/' user
|
|
if [ -r '/home/user/.local/share/applications/defaults.list' ]; then
|
|
su -c 'cat /home/user/.local/share/applications/defaults.list >> /home_volatile/user/.local/share/applications/defaults.list' user
|
|
fi
|
|
return 0
|
|
}
|
|
|
|
case "$1" in
|
|
start)
|
|
start
|
|
;;
|
|
stop)
|
|
stop
|
|
;;
|
|
*)
|
|
echo $"Usage: $0 {start|stop}"
|
|
exit 3
|
|
;;
|
|
esac
|
|
|
|
exit $RETVAL
|